skip to main content
10.1145/3477314.3507023acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Ensuring privacy in the application of the Brazilian general data protection law (LGPD)

Published:06 May 2022Publication History

ABSTRACT

Currently, many organizations make use of the personal data of their users. Personal data is the set of information that can lead to the identification of a specific person and, therefore, this information is generally vital for the operations and business continuity of organizations. Consequently, the relevance of adopting methodologies that guarantee the protection and privacy of user information is indispensable to prevent the leaking of sensible information. Therefore, laws were created to establish essential requirements for organizations to provide support and protection to the personal data of users, such as the General European Data Protection Regulation (GDPR) and the Brazilian General Data Protection Law (LGPD). This work aims to develop a framework to support ICT professionals in adapting companies to the requirements demanded by the LGPD. To achieve the purpose, a framework based on the BEST methodology (Business Engaged Security Transformation) was proposed. This framework has a sustainable approach and can be implemented by any organization. A survey was carried out to collect the perception of Information and Communication Technology (ICT) practitioners in relation to adherence to LGPD adaptation actions by organizations. As a result, we identified a weakness in the privacy and information security management methodology implemented in organizations, which, in the future, may result in risks and damage to user information.

References

  1. Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, and Ali Mili. 2013. Risk Assessment Methodology Based on the NISTIR 7628 Guidelines. In HICSS. IEEE Computer Society, 1802--1811. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Eric Araújo, Jéssyka Vilela, Carla Silva, and Carina Alves. 2021. Are My Business Process Models Compliant With LGPD? The LGPD4BP Method to Evaluate and to Model LGPD aware Business Processes. In SBSI. ACM, 46:1--46:9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Baptista Luz Advogados. 2019. Comparing privacy laws: GDPR v. LGPD. Retrieved October 16, 2021, from https://baptistaluz.com.br/institucional/comparing-privacy-laws-gdpr-v-lgpd/.Google ScholarGoogle Scholar
  4. Luca Bolognini and Camilla Bistolfi. 2017. Pseudonymization and impacts of Big (personal/anonymous) Data processing in the transition from the Directive 95/46/EC to the new EU General Data Protection Regulation. Computer Law & Security Review 33, 2 (2017), 171--181.Google ScholarGoogle ScholarCross RefCross Ref
  5. Brazil. 2018. Law n° 13.709/2018. Retrieved October 16, 2021, from http://www.planalto.gov.br/ccivil_03/_ato2015-2018/2018/lei/L13709compilado.htm.Google ScholarGoogle Scholar
  6. Fei Bu, Nengmin Wang, Bin Jiang, and Huigang Liang. 2020. "Privacy by Design" implementation: Information system engineers' perspective. International Journal of Information Management 53 (2020), 102124. Google ScholarGoogle ScholarCross RefCross Ref
  7. Luiz Carvalho, Jonice Oliveira, Claudia Cappelli, and Violeta Majer. 2019. Desafios de Transparência pela Lei Geral de Proteção de Dados Pessoais. In Anais do VII Workshop de Transparência em Sistemas. SBC, Porto Alegre, RS, Brasil, 21--30. Google ScholarGoogle ScholarCross RefCross Ref
  8. Luiz Paulo Carvalho, Jonice Oliveira, and Claudia Cappelli. 2020. Pesquisas em Análise de Redes Sociais e LGPD, análises e recomendações. In Anais do IX Brazilian Workshop on Social Network Analysis and Mining. SBC, Porto Alegre, RS, Brasil, 73--84. Google ScholarGoogle ScholarCross RefCross Ref
  9. Luis Castro Silva and Samyr Vale. 2021. A Methodology for Network Security Infrastructure according to the New Brazilian General Law for Personal Data Protection. International Journal of Computer Applications 183 (07 2021), 1--8. Google ScholarGoogle ScholarCross RefCross Ref
  10. Kevin EWB Cattley. 2020. LGPD: a comparative analysis of a new law in shifting paradigms. Bachelor's Thesis. Fundação Getúlio Vargas (FGV).Google ScholarGoogle Scholar
  11. Ann Cavoukian et al. 2009. Privacy by design: The 7 foundational principles. Information and privacy commissioner of Ontario, Canada 5 (2009), 12.Google ScholarGoogle Scholar
  12. Vasiliki Diamantopoulou, Aggeliki Tsohou, and Maria Karyda. 2019. General Data Protection Regulation and ISO/IEC 27001:2013: Synergies of Activities Towards Organisations' Compliance. In Trust, Privacy and Security in Digital Business, Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa, and Ismail Khalil (Eds.). Springer International Publishing, Cham, 94--109.Google ScholarGoogle Scholar
  13. Edna Dias Canedo, Angelica Toffano Seidel Calazans, Eloisa Toffano Seidel Masson, Pedro Henrique Teixeira Costa, and Fernanda Lima. 2020. Perceptions of ICT practitioners regarding software privacy. Entropy 22, 4 (2020), 429.Google ScholarGoogle ScholarCross RefCross Ref
  14. Abigayle Erickson. 2018. Comparative Analysis of the EU's GDPR and Brazil's LGPD: Enforcement Challenges with the LGPD. Brook. J. Int'l L. 44 (2018), 859.Google ScholarGoogle Scholar
  15. Tatiana Ermakova, Annika Baumann, Benjamin Fabian, and Hanna Krasnova. 2014. Privacy policies and users' trust: does readability matter?. In Proceedings of the Twentieth Americas Conference on Information Systems. Association for Information Systems, Savannah, 12.Google ScholarGoogle Scholar
  16. Sâmmara Éllen Renner Ferrão, Artur Potiguara Carvalho, Edna Dias Canedo, Alana Paula Barbosa Mota, Pedro Henrique Teixeira Costa, and Anderson Jefferson Cerqueira. 2021. Diagnostic of Data Processing by Brazilian Organizations---A Low Compliance Issue. Information 12, 4 (2021), 168.Google ScholarGoogle ScholarCross RefCross Ref
  17. International Organization for Standardization. 2013. Information technology --- Security techniques --- Information security management systems --- Requirements . Standard. International Organization for Standardization, Geneva, CH.Google ScholarGoogle Scholar
  18. Gislaine Parra Freund, Priscila Basto Fagundes, and Douglas Dyllon Jeronimo de Macedo. 2020. Identification of the Relationships Between the Stages of the Data Lifecycle and the Principles of the Brazilian General Data Protection Act. In Data and Information in Online Environments, Rogério Mugnaini (Ed.). Springer International Publishing, Cham, 79--88.Google ScholarGoogle Scholar
  19. Lara Rocha Garcia, Edson Aguilera-Fernandes, Rafael Augusto Moreno Gonçalves, and Marcos Ribeiro Pereira-Barretto. 2020. Lei Geral de Proteção de Dados Pessoais (LGPD): guia de implantação. Edgard Blücher Ltda, São Paulo.Google ScholarGoogle Scholar
  20. Michelle Goddard. 2017. The EU General Data Protection Regulation (GDPR): European regulation that has a global impact. International Journal of Market Research 59, 6 (2017), 703--705.Google ScholarGoogle ScholarCross RefCross Ref
  21. Johannes Heurix and Thomas Neubauer. 2011. Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption. In Trust, Privacy and Security in Digital Business, Steven Furnell, Costas Lambrinoudakis, and Günther Pernul (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 186--197.Google ScholarGoogle Scholar
  22. Christian Kurtz, Martin Semmann, and Tilo Böhmann. 2018. Privacy by Design to Comply with GDPR: A Review on Third-Party Data Processors. In Proceedings of the Twenty-fourth Americas Conference on Information Systems. Association for Information Systems, New Orleans, 10.Google ScholarGoogle Scholar
  23. Ronaldo Lemos, Natalia Langenegger, Juliana Pacetta Ruiz, Sofia Lima Franco, Andréa Guimarães Gobbato, Daniel Douek, Ramon Alberto dos Santos, and Rafael A. Ferreira Zanatta. 2020. Brazilian General Data Protection Law (LGPD, English translation). Retrieved October 16, 2021, from https://iapp.org/resources/article/brazilian-data-protection-law-lgpd-english-translation/.Google ScholarGoogle Scholar
  24. Ling Li, Wu He, Li Xu, Ivan Ash, Mohd Anwar, and Xiaohong Yuan. 2019. Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior. International Journal of Information Management 45 (2019), 13--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Zhanna Malekos, Eugenia Lostri, and James A. Lewis. 2020. The Hidden Costs of Cybercrime. Retrieved October 16, 2021, from https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hidden-costs-of-cybercrime.pdf.Google ScholarGoogle Scholar
  26. Antônio Diogo Martins, Patrícia Barros, José Monteiro, and Javam Machado. 2020. LGPD: A Formal Concept Analysis and its Evaluation. In Anais do XXXV Simpósio Brasileiro de Bancos de Dados. SBC, Porto Alegre, RS, Brasil, 259--264. Google ScholarGoogle ScholarCross RefCross Ref
  27. Antônio Diogo Forte Martins, Patrícia Vieira da Silva Barros, José Maria Monteiro, and Javam de Castro Machado. 2020. LGPD: A Formal Concept Analysis and its Evaluation. In SBBD. SBC, , 259--264. Google ScholarGoogle ScholarCross RefCross Ref
  28. Ministry of Citizenship. 2021. Princípios da LGPD [LGPD's Principles]. https://www.gov.br/cidadania/pt-br/acesso-a-informacao/lgpd/principios-da-lgpdGoogle ScholarGoogle Scholar
  29. Renato Carauta Ribeiro and Edna Dias Canedo. 2020. Using MCDA for Selecting Criteria of LGPD Compliant Personal Data Security. In DG.O. ACM, 175--184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Alexander Setiawan, Adi Wibowo, and Andrew Hartanto Susilo. 2017. Risk analysis on the development of a business continuity plan. In 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT). IEEE, Kuta Bali, Indonesia, 1--4. Google ScholarGoogle ScholarCross RefCross Ref
  31. Nelli V. Syreyshchikova, Danil Yu. Pimenov, Tadeusz Mikolajczyk, and Liviu Moldovan. 2019. Information Safety Process Development According to ISO 27001 for an Industrial Enterprise. Procedia Manufacturing 32 (2019), 278--285. 12th International Conference Inter-disciplinarity in Engineering, INTER-ENG 2018, 4--5 October 2018, Tirgu Mures, Romania. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Ensuring privacy in the application of the Brazilian general data protection law (LGPD)

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing
          April 2022
          2099 pages
          ISBN:9781450387132
          DOI:10.1145/3477314

          Copyright © 2022 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 6 May 2022

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,650of6,669submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader